An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/165301/OpenEMR-6.0.0-6.1.0-dev-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
https://trovent.io/security-advisory-2109-01 | Exploit Third Party Advisory |
https://trovent.github.io/security-advisories/TRSA-2109-01/TRSA-2109-01.txt | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2021/Dec/38 | Exploit Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-12-16 20:15
Updated : 2021-12-22 12:20
NVD link : CVE-2021-41843
Mitre link : CVE-2021-41843
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
open-emr
- openemr